Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Device and method for carrying out a cryptographic method

Inactive Publication Date: 2015-09-24
ROBERT BOSCH GMBH
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention provides a device that utilizes a deterministic function and at least one secret key for cryptographic purposes, allowing for complex random generators to be avoided. The device also achieves high levels of concealing of electromagnetic radiation, energy signatures, etc. through spatial integration of functional components and a common terminal for an electrical power supply. Additionally, the invention prevents successful DPA attacks by altering the physical behavior of the cryptographic unit through the secret key. The secret key is stored internally in the functional unit, such as in a read-only memory.

Problems solved by technology

This makes a precise analysis of the cryptographic unit more difficult.
Given a suitable length of the secret key, for example also 128 bits or more, in this way a DPA attack can be made more difficult in such a way that it cannot be successfully carried out with currently available computing power.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for carrying out a cryptographic method
  • Device and method for carrying out a cryptographic method
  • Device and method for carrying out a cryptographic method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035]FIG. 1 schematically shows a block diagram of a first specific embodiment of device 100 according to the present invention. Device 100 has a cryptographic unit 120 that is fashioned to carry out a cryptographic method 110, or at least one step of a cryptographic method 110. An encryption according to the AES (Advanced Encryption Standard) may be taken as an example of a cryptographic method.

[0036]Device 100 is supplied with input data i that can be for example a bit sequence that is to be encrypted by cryptographic unit 120. Correspondingly, encrypted output data o are obtained at an output of cryptographic unit 120.

[0037]According to the present invention, device 100 has, in addition to cryptographic unit 120, a functional unit 130 that is fashioned to carry out a deterministic function as a function of the input data and of at least one secret key k.

[0038]The operation of functional unit 130 in parallel, at least at times, to the operation of cryptographic unit 120 makes dif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A device for carrying out a cryptographic method includes: a cryptographic unit carrying out at least one step of the cryptographic method; and a functional unit carrying out a deterministic function as a function of input data supplied to the device and at least one secret key.

Description

BACKGROUND OF THE INVENTION[0001]1. Field of the Invention[0002]The present invention relates to a device and a method for carrying out a cryptographic process.[0003]2. Description of the Related Art[0004]Such devices and methods are known, for example from U.S. Pat. No. 7,599,488 B2.[0005]The known device has a microprocessor core to which a random number generator is allocated in order to manipulate the execution of cryptographic instructions on the microprocessor core in a random manner. This makes cryptographic attacks on the microprocessor core carrying out the cryptographic method more difficult. In particular, so-called differential power analysis (DPA) attacks are made more difficult, because the temporal relationship between a regular clock signal and the actual execution of the individual steps of the cryptographic method by the microprocessor core is concealed using the random numbers.[0006]A disadvantage of the known system is the fact that a random number generator is r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L2209/24H04L9/3242H04L9/003H04L9/0618H04L9/0643H04L2209/12
Inventor DUPLYS, PAULIUSLEWIS, MATTHEW
Owner ROBERT BOSCH GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products